Author of the publication

A Multiple-Criteria Quadratic Programming Approach to Network Intrusion Detection.

, , , , and . CASDMKM, volume 3327 of Lecture Notes in Computer Science, page 145-153. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AUC Maximizing Support Vector Machines with Feature Selection., , , and . ICCS, volume 4 of Procedia Computer Science, page 1691-1698. Elsevier, (2011)CAS: Content Attribution System for Network Forensics., , , , and . ISCTCS, volume 520 of Communications in Computer and Information Science, page 129-136. Springer, (2014)PrUE: Distilling Knowledge from Sparse Teacher Networks., , , and . ECML/PKDD (3), volume 13715 of Lecture Notes in Computer Science, page 102-117. Springer, (2022)Deep Structured Clustering of Short Text., , , , and . Big Data (CCF), volume 1496 of Communications in Computer and Information Science, page 310-323. Springer, (2021)A Multi-Level Analysis Framework in Network Security Situation Awareness., , and . ITQM, volume 17 of Procedia Computer Science, page 530-536. Elsevier, (2013)A Bigram based Real Time DNS Tunnel Detection Approach., , , , and . ITQM, volume 17 of Procedia Computer Science, page 852-860. Elsevier, (2013)Semantic-Enhanced Image Clustering., , , , and . AAAI, page 6869-6878. AAAI Press, (2023)An On-the-Fly Scheduling Strategy for Distributed Stream Processing Platform., , , , , and . ISPA/IUCC/BDCloud/SocialCom/SustainCom, page 773-780. IEEE, (2018)Spectral Clustering of Customer Transaction Data With a Two-Level Subspace Weighting Method., , , , , and . IEEE Trans. Cybern., 49 (9): 3230-3241 (2019)Convergence of the EDIIS Algorithm for Nonlinear Equations., and . SIAM J. Sci. Comput., 41 (1): A365-A379 (2019)